Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp960160pxb; Wed, 3 Mar 2021 22:35:26 -0800 (PST) X-Google-Smtp-Source: ABdhPJziv/lMn1q3HOQbanZniKns9np9jMIlg7BKmiihQ4DmTdSJCegKu2zroVo7pu2Fk94AUDlW X-Received: by 2002:a17:906:25c4:: with SMTP id n4mr2578904ejb.359.1614839726225; Wed, 03 Mar 2021 22:35:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614839726; cv=none; d=google.com; s=arc-20160816; b=ay9ynL9t1r35f25UwLLJp9Ce7ZDKQPmBB2kuxyGRmwwOsdSSS5fW+SD/OfCmkD2xbN N/6J7J4ir5wT4LWRtlVB24hQ/34FTBcdrWDIJb65Pa/22z4LUZeouhT1+pSBqH7WkOQp yn928PuD+CSheA0lMcSyu5UDBBAdXfSVHuUhDWhZoGVKnTB68nf9Bhz3TzrurSyOIdWe weEpuAVTZ++K0gC45FBmL91pakal+d7nvXtJZBuo7E1UsWSo2PkewX7aARB/tiq9SrBI WL1s4HGw2WKX7kW/5IiGsZq0han1PMPWri2DFiW83obLNLcEqyPDew+88WHdfKt6iS6+ ftCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=uQDTZD6aOWiMURqa+q3U34pq64jagkHulsjJuj+2YBU=; b=d5T52o4zBEpjQB/vHuk4LI9bANv+uQEvjgOAfA0le6u4GowDXhFHaJMFIB0TNeoC2p SNDiVSTUNjNPrl55dD4GArasrCiYuGWVNj4JE8uzcqet5Ih4BRe6Mj74FGhGm1LKtdkT U2a8Xe3sm2Wgt9yc44dN8NZMvsZBhunzZm9cRzmypBEcYGzyt0K5axSgeddCBbr/3H57 DhwPFv7yfhekflnYZZ7Cavd5IAHJ6UvV9555CVrzalFblqmayLhiO0sYV3CWF4pn4j/e p1aSwiF8zwif2pfP3GBm7kawB0DoRizDYBufc5mUMTPzm269s1v2b7KeiS/USVQZfeYb bLjg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZT9xGl97; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u18si17106953edv.166.2021.03.03.22.35.02; Wed, 03 Mar 2021 22:35:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZT9xGl97; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1444841AbhCBTOp (ORCPT + 99 others); Tue, 2 Mar 2021 14:14:45 -0500 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:35096 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1576868AbhCBQ1h (ORCPT ); Tue, 2 Mar 2021 11:27:37 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1614702364; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=uQDTZD6aOWiMURqa+q3U34pq64jagkHulsjJuj+2YBU=; b=ZT9xGl97g/sXXq/hwM8zWSS5Ry24pAVekMLGhbWULwpJgSP5bAgp7NWfZdye7PUzkuXPYk BBlH0dgMmMEIf6Attyo47lJOLfpZLT0cnXrCsVtIY9F5Dh9k7+xQTyPTFZzNrlR1zmkTSU GwownLSSMfnGOU9ABVkYa5uKaT/sSD0= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-516-fVq9UChuNJKzzTSwRO_jGQ-1; Tue, 02 Mar 2021 11:26:00 -0500 X-MC-Unique: fVq9UChuNJKzzTSwRO_jGQ-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 2A008100CCC1; Tue, 2 Mar 2021 16:25:59 +0000 (UTC) Received: from horse.redhat.com (ovpn-114-140.rdu2.redhat.com [10.10.114.140]) by smtp.corp.redhat.com (Postfix) with ESMTP id 9CC9910023AE; Tue, 2 Mar 2021 16:25:55 +0000 (UTC) Received: by horse.redhat.com (Postfix, from userid 10451) id 8A18622054F; Tue, 2 Mar 2021 11:25:54 -0500 (EST) Date: Tue, 2 Mar 2021 11:25:54 -0500 From: Vivek Goyal To: Luis Henriques Cc: Miklos Szeredi , linux-fsdevel@vger.kernel.org, virtio-fs@redhat.com, linux-kernel@vger.kernel.org, "Dr. David Alan Gilbert" Subject: Re: [RFC PATCH] fuse: Clear SGID bit when setting mode in setacl Message-ID: <20210302162554.GE220334@redhat.com> References: <20210226183357.28467-1-lhenriques@suse.de> <20210301163324.GC186178@redhat.com> <20210302160033.GD220334@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210302160033.GD220334@redhat.com> X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 02, 2021 at 11:00:33AM -0500, Vivek Goyal wrote: > On Mon, Mar 01, 2021 at 06:20:30PM +0000, Luis Henriques wrote: > > On Mon, Mar 01, 2021 at 11:33:24AM -0500, Vivek Goyal wrote: > > > On Fri, Feb 26, 2021 at 06:33:57PM +0000, Luis Henriques wrote: > > > > Setting file permissions with POSIX ACLs (setxattr) isn't clearing the > > > > setgid bit. This seems to be CVE-2016-7097, detected by running fstest > > > > generic/375 in virtiofs. Unfortunately, when the fix for this CVE landed > > > > in the kernel with commit 073931017b49 ("posix_acl: Clear SGID bit when > > > > setting file permissions"), FUSE didn't had ACLs support yet. > > > > > > Hi Luis, > > > > > > Interesting. I did not know that "chmod" can lead to clearing of SGID > > > as well. Recently we implemented FUSE_HANDLE_KILLPRIV_V2 flag which > > > means that file server is responsible for clearing of SUID/SGID/caps > > > as per following rules. > > > > > > - caps are always cleared on chown/write/truncate > > > - suid is always cleared on chown, while for truncate/write it is cleared > > > only if caller does not have CAP_FSETID. > > > - sgid is always cleared on chown, while for truncate/write it is cleared > > > only if caller does not have CAP_FSETID as well as file has group execute > > > permission. > > > > > > And we don't have anything about "chmod" in this list. Well, I will test > > > this and come back to this little later. > > > > > > I see following comment in fuse_set_acl(). > > > > > > /* > > > * Fuse userspace is responsible for updating access > > > * permissions in the inode, if needed. fuse_setxattr > > > * invalidates the inode attributes, which will force > > > * them to be refreshed the next time they are used, > > > * and it also updates i_ctime. > > > */ > > > > > > So looks like that original code has been written with intent that > > > file server is responsible for updating inode permissions. I am > > > assuming this will include clearing of S_ISGID if needed. > > > > > > But question is, does file server has enough information to be able > > > to handle proper clearing of S_ISGID info. IIUC, file server will need > > > two pieces of information atleast. > > > > > > - gid of the caller. > > > - Whether caller has CAP_FSETID or not. > > > > > > I think we have first piece of information but not the second one. May > > > be we need to send this in fuse_setxattr_in->flags. And file server > > > can drop CAP_FSETID while doing setxattr(). > > > > > > What about "gid" info. We don't change to caller's uid/gid while doing > > > setxattr(). So host might not clear S_ISGID or clear it when it should > > > not. I am wondering that can we switch to caller's uid/gid in setxattr(), > > > atleast while setting acls. > > > > Thank for looking into this. To be honest, initially I thought that the > > fix should be done in the server too, but when I looked into the code I > > couldn't find an easy way to get that done (without modifying the data > > being passed from the kernel in setxattr). > > > > So, what I've done was to look at what other filesystems were doing in the > > ACL code, and that's where I found out about this CVE. The CVE fix for > > the other filesystems looked easy enough to be included in FUSE too. > > Hi Luis, > > I still feel that it should probably be fixed in virtiofsd, given fuse client > is expecting file server to take care of any change of mode (file > permission bits). Havid said that, there is one disadvantage of relying on server to do this. Now idmapped mount patches have been merged. If virtiofs were to ever support idmapped mounts, this will become an issue. Server does not know about idmapped mounts, and it does not have information on how to shift inode gid to determine if SGID should be cleared or not. So if we were to keep possible future support of idmapped mounts in mind, then solving it in client makes more sense. (/me is afraid that there might be other dependencies like this elsewhere). Miklos, WDYT. Thanks Vivek > > I wrote a proof of concept patch and this should fix this. But it > drop CAP_FSETID always. So I will need to modify kernel to pass > this information to file server and that should properly fix > generic/375. > > Please have a look. This applies on top of fuse acl support V4 patches > I had posted. I have pushed all the patches on a temporary git branch > as well. > > https://github.com/rhvgoyal/qemu/commits/acl-sgid > > Vivek > > > Subject: virtiofsd: Switch creds, drop FSETID for system.posix_acl_access xattr > > When posix access acls are set on a file, it can lead to adjusting file > permissions (mode) as well. If caller does not have CAP_FSETID and it > also does not have membership of owner group, this will lead to clearing > SGID bit in mode. > > Current fuse code is written in such a way that it expects file server > to take care of chaning file mode (permission), if there is a need. > Right now, host kernel does not clear SGID bit because virtiofsd is > running as root and has CAP_FSETID. For host kernel to clear SGID, > virtiofsd need to switch to gid of caller in guest and also drop > CAP_FSETID (if caller did not have it to begin with). > > This is a proof of concept patch which switches to caller's uid/gid > and alwasys drops CAP_FSETID in lo_setxattr(system.posix_acl_access). > This should fix the xfstest generic/375 test case. > > This patch is not complete yet. Kernel should pass information when > to drop CAP_FSETID and when not to. I will look into modifying > kernel to pass this information to file server. > > Reported-by: Luis Henriques > Yet-to-be-signed-off-by: Vivek Goyal > --- > tools/virtiofsd/passthrough_ll.c | 28 +++++++++++++++++++++++++++- > 1 file changed, 27 insertions(+), 1 deletion(-) > > Index: rhvgoyal-qemu/tools/virtiofsd/passthrough_ll.c > =================================================================== > --- rhvgoyal-qemu.orig/tools/virtiofsd/passthrough_ll.c 2021-03-02 08:06:20.539820330 -0500 > +++ rhvgoyal-qemu/tools/virtiofsd/passthrough_ll.c 2021-03-02 10:46:40.901334665 -0500 > @@ -172,7 +172,7 @@ struct lo_data { > int user_killpriv_v2, killpriv_v2; > /* If set, virtiofsd is responsible for setting umask during creation */ > bool change_umask; > - int user_posix_acl; > + int user_posix_acl, posix_acl; > }; > > static const struct fuse_opt lo_opts[] = { > @@ -677,6 +677,7 @@ static void lo_init(void *userdata, stru > fuse_log(FUSE_LOG_DEBUG, "lo_init: enabling posix acl\n"); > conn->want |= FUSE_CAP_POSIX_ACL | FUSE_CAP_DONT_MASK; > lo->change_umask = true; > + lo->posix_acl = true; > } else { > /* User either did not specify anything or wants it disabled */ > fuse_log(FUSE_LOG_DEBUG, "lo_init: disabling posix_acl\n"); > @@ -2981,12 +2982,37 @@ static void lo_setxattr(fuse_req_t req, > > sprintf(procname, "%i", inode->fd); > if (S_ISREG(inode->filetype) || S_ISDIR(inode->filetype)) { > + bool switched_creds = false; > + struct lo_cred old = {}; > + > fd = openat(lo->proc_self_fd, procname, O_RDONLY); > if (fd < 0) { > saverr = errno; > goto out; > } > + > + if (lo->posix_acl && !strcmp(name, "system.posix_acl_access")) { > + ret = lo_change_cred(req, &old, false); > + if (ret) { > + saverr = ret; > + goto out; > + } > + ret = drop_effective_cap("FSETID", NULL); > + if (ret != 0) { > + lo_restore_cred(&old, false); > + saverr = ret; > + goto out; > + } > + switched_creds = true; > + } > + > ret = fsetxattr(fd, name, value, size, flags); > + > + if (switched_creds) { > + if (gain_effective_cap("FSETID")) > + fuse_log(FUSE_LOG_ERR, "Failed to gain CAP_FSETID\n"); > + lo_restore_cred(&old, false); > + } > } else { > /* fchdir should not fail here */ > assert(fchdir(lo->proc_self_fd) == 0);